The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a …
J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of theoretical cryptography. Since that time a number of papers have been published which …
S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of any function to a cluster of n machines in such a way that no adversary that corrupts at most …
H Carter, B Mood, P Traynor… - Security and …, 2016 - Wiley Online Library
Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic …
Secure computation enables mutually suspicious parties to compute a joint function of their private inputs while providing strong security guarantees. However, its use in practice seems …
N Smart - US Patent App. 12/827,247, 2012 - Google Patents
0001. This invention relates to cryptography, and in par ticular relates to a method and a system that allows out Sourced multi-party computation to be performed in a secure way …
The current move to Cloud Computing raises the need for verifiable delegation of computations, where a weak client delegates his computation to a powerful server, while …
A Shelat, CH Shen - Advances in Cryptology–EUROCRYPT 2011: 30th …, 2011 - Springer
We present a method to compile Yao's two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our …
The massive amount of data that is being collected by today's society has the potential to advance scientific knowledge and boost innovations. However, people often lack sufficient …